MIS|TI
  • About MISTI
    • Overview
    • FAQs
    • Contact Us
    • Careers
    • Instructor Bios
    • Hotel Information
  • Contact

(508) 879-7999

USA EMEA / APAC
  • Linkedin
  • Twitter
  • Facebook
  • Email Newsletter
USA EMEA / APAC

Event Search

Event Search

  • About MISTI
    • Overview
    • FAQs
    • Contact Us
    • Careers
    • Instructor Bios
    • Hotel Information
  • Contact

(508) 879-7999

  • Training
    • Seminars
    • LeaderQuest Training
    • LeaderQuest Course Listing
    • ACL Training
    • Executive Programs
    • Training Weeks
    • Virtual Seminars
    • Certificate Programs
    • Course Evaluation
  • Tailored Training Solutions
  • e-Learning
    • Webinars
  • Content
    • Internal Audit Insights
    • Resource Center
  • Quick Links
    • Training Weeks
    • Expo/Sponsorship Information
    • Ways to Save
    • Request Information
    • Request to Speak
    • Newsletter Sign Up
    • Virtual Classroom Information
    • Course Evaluation Information
    • Event Downloads
  • Event Search
  • Training
    • Seminars
    • LeaderQuest Training
    • LeaderQuest Course Listing
    • ACL Training
    • Executive Programs
    • Training Weeks
    • Virtual Seminars
    • Certificate Programs
    • Course Evaluation
  • Tailored Training Solutions
  • e-Learning
    • Webinars
  • Content
    • Internal Audit Insights
    • Resource Center
  • Quick Links
    • Training Weeks
    • Expo/Sponsorship Information
    • Ways to Save
    • Request Information
    • Request to Speak
    • Newsletter Sign Up
    • Virtual Classroom Information
    • Course Evaluation Information
    • Event Downloads
  • Event Search
  • Linkedin
  • Twitter
  • Facebook
  • Email Newsletter

Event Search

  1. Home
  2. Infosec Insider

Infosec Insider

ft: Peoplef: 2000-01-01t: 3000-01-02c: 2021-03-01
asdf
2019-07-16 05:04:49
Featured Article:

Attracting, Retaining, and Training in Infosec

By Marcos Colon
July 16, 2019
In this interview with Kelly York, security awareness manager at the McDonald's Corporation, she discusses the state of attracting and retaining talent in information security and also provides some helpful tips that could get you and your business over the hump when it comes to the topic.
2019-06-18 05:22:18

DeMISITIfying Security-Recruiting and Retaining Cyber Talent (Part 2)

By Marcos Colon
June 18, 2019
Security experts Raef Meeuwisse and Ed Moyle provide a breakdown of tips you up-and-coming security leaders can leverage to have a successful start in the cybersecurity field.
2019-05-14 05:29:10

The Holistic CISO: How to Increase Organizational Effectiveness

By Marcos Colon
May 14, 2019
The modern-day CISO faces a multitude of challenges they must face head-on to build a sense of leadership and vision within the security and risk department. InfoSec Insider caught up with CISO Spotlight's Todd Fitzgerald, who offered up concrete tips up-and-coming security leaders can leverage when it comes to achieving organizational effectiveness.
2019-05-07 05:23:55

A Guide to Purchasing Cybersecurity Solutions

By Josue Ledesma
May 07, 2019
Knowing how to approach buying cybersecurity vendors is a difficult task. There’s a lot to manage internally (budget, needs, fit) and it’s hard to know what kind of vendors or solutions would serve your organization best. The fear, uncertainty, and doubt (FUD) experienced by cybersecurity vendors are especially troubling.
2019-05-02 05:56:10

Election Trouble Ahead: Voter Machine Issues

By Marcos Colon
May 02, 2019
Rapid7’s Director of Research Tod Beardsley highlights what you should know about voting machine security and what more needs to be done for the approaching 2020 elections.
2019-04-30 05:40:02

DeMISTIfying Security: How to Boost Your Cyber Budget

By Ed Moyle and Raef Meeuwisse
April 30, 2019
In this follow-up episode, the DeMISTIfying Security experts provide you with proven tips that you can leverage to boost the cybersecurity budget within the business. Don't miss out on this episode.
2019-04-25 05:27:50

The Cyber Impact on Democracy

By Marcos Colon
April 25, 2019
Cybereason CSO Sam Curry shares how “black propaganda” is leveraged by foreign adversaries, why 2016 was a failure of imagination from a cyber standpoint, and what we should be prepared for leading into the 2020 presidential elections.
2019-04-23 05:48:28

Cybersecurity Leadership Today: Why It's Failing and What Can Be Done to Fix It

By Marcos Colon
April 23, 2019
InfoSec Insider caught up with Cylance's Chief Security and Trust Officer, Malcolm Harkins, who shared why he believes leadership in information security today is sorely lacking, but more importantly, what needs to be done in order for today's security leaders to create an "ideal state" for their departments.
2019-04-11 05:07:16

Who Watches the Watchers?: A Discussion on Who Can Be Trusted Today

By Marcos Colon
April 11, 2019
Security departments have evolved tremendously over the years, but so have cyber threats. As organizations become more aware that nearly no one can be trusted, whose job is it to watch the watchers? At this year’s RSA Conference in San Francisco, InfoSec Insider caught up with Forcepoint's Dr. Richard Ford who dives into the topic.
2019-04-09 05:48:15

DeMISTIfying Security: Is the Board to Blame When There's Cyber Shame?

By Ed Moyle and Raef Meeuwisse
April 09, 2019
In the latest edition of InfoSec Insider’s DeMISTIfying Security series, veteran experts Ed Moyle and Raef Meeuwisse discuss the state of cybersecurity as it relates to executive support within the business.
2019-04-04 05:14:57

Cybercrime Extortion: 2019 Trends and Insights

By Marcos Colon
April 04, 2019
Cyber swindlers are continually looking to reinvent themselves, and their methods are becoming savvier. InfoSec Insider caught up with Digital Shadows CISO Rick Holland on the recent research that his team has conducted on cybercrime extortion, and how security practitioners can secure their organizations don't fall prey to these attacks.
2019-03-28 05:49:26

Must You Rely on Cybersecurity Vendors to Be Secure? Is Do-It-Yourself Cybersecurity a Viable Option?

By Jim Romeo
March 28, 2019
Cybersecurity remains a persistent challenge in information technology, and for IT security professionals, AI and other tools are valuable for organically managing cybersecurity without depending on vendors that might have more sophisticated tools and experience using them.
2019-03-26 05:02:47

The Basic Cyber Law Concepts Every Security Professional Needs to Know

By Steve Black, Professor of Law, Texas Tech University
March 26, 2019
Cyber law is focused on bringing more clarity to privacy questions that new technology introduce. It’s important for all security professionals to have a basic understanding of current and potential future cyber law concepts in order to stay compliant and ensure sensitive data stays safe.
2019-03-12 05:10:01

How Moving Away From Traditional Academia Has Changed Cybersecurity Education

By Paul Rohmeyer, Program Director MS Information Systems, Stevens Institute of Technology
March 12, 2019
Today, there are highly specialized training options offered both in-person and online in the form of meetups, webinars, formal courses, and in-house and external conferences. The attractiveness (cost, convenience, and specialty) of these alternative options has driven cybersecurity talent to steer towards education avenues outside of traditional academia.
2019-03-07 05:08:13

Why Your Cybersecurity Comms Need to Evolve

By Dawn Papandrea
March 07, 2019
When you’re talking information security among your peers, it sounds like a totally different language than the rest of your organization speaks. This puts infosec professionals in a bind. On the one hand, security vulnerabilities exist throughout the company. Yet you, alone, are carrying the burden of knowing just how serious it can get. That’s why it’s up to you to create an information security communication strategy.
2019-02-26 05:33:43

How to Turbocharge Your Cybersecurity Awareness Training

By Jim Romeo
February 26, 2019
Cybersecurity awareness training is a critical component to your security hygiene. The most effective training programs are offered frequently and use available frameworks, focus points, tools, and tactics to build a culture where cybersecurity is embraced, not avoided or shunned.
2019-02-07 05:00:06

2019 Cybersecurity Threat Trends: What Should Be On Your Radar Part 2

By Josue Ledesma
February 07, 2019
Last week we shared the first part of this two-part series on cyber threats in 2019. This week we wrap up the remainder of the insights we shared thanks to our conversation with subject matter expert Adrian Sanabria, VP of strategy and product at NopSec.
2019-01-31 05:50:59

2019 Cybersecurity Threat Trends: What Should Be on Your Radar

By Josue Ledesma
January 31, 2019
InfoSec Insider caught up with one SME that helped us put together a list of the looming threats your company should keep an eye on and how organizations can defend themselves accordingly. Here's a look at what you should have on your radar.
2019-01-29 05:57:19

The Thrill of the Hunt (Threat Hunting, That Is)

By Jim Romeo
January 29, 2019
The term threat hunting has been tossed around a lot, but what does it actually mean and can your cybersecurity playbook benefit from it? Many organizations are tapping into its benefits, so we've decided to provide you with a breakdown in this feature article.
2019-01-24 05:18:57

Lessons Learned: How to Defend Your Organization Against Social Engineering

By Josue Ledesma
January 24, 2019
Social engineering is unique in the cybersecurity world as its scope of influence can vary widely on the software, hardware, and even psychological level. In this article, we’ll cover social engineering attacks and help you learn from recent developments in the space.
2019-01-22 05:25:41

DeMISTIfying Security: To 2019 and Beyond!

By Ed Moyle and Raef Meeuwisse
January 22, 2019
In last week's segment, Ed and Raef discussed some of the major developments in infosec in 2018. This week, they take out their crystal ball and look into 2019, sharing their thoughts on what many practitioners could expect.
2019-01-15 05:26:38

DeMISTIfying Security: 2018 Year in Review

By Ed Moyle and Raef Meeuwisse
January 15, 2019
In the latest installment of InfoSec Insider’s DeMISTIfying Security series, security experts Ed Moyle and Raef Meeuwisse return to review the major breaches, developments, and takeaways that you can get from information security events in 2018.
2019-01-10 05:00:59

How to Prepare for the Digital Transformation Era

By Marcos Colón
January 10, 2019
Like it or not, the digital transformation era is here. But what does that actually mean--and more importantly--what does that mean to you? We caught up with Zscaler's Business Value Consulting Leader, Jason Georgi, who broke it down for InfoSec Insider.
2018-12-27 11:34:33

InfoSec Insider Top 10 in 2018

By Marcos Colón
December 27, 2018
As 2018 wraps up, InfoSec Insider looks back at some of the most popular articles we've produced for our loyal audience. From communicating security metrics to the board and making sense of attack patterns, to key areas that you should focus your cybersecurity strategy on, here's a list of the top 10 articles.
2018-12-11 05:49:11

Leveraging Collaboration and SOAR to Secure Our Digital Future

By Cody Cornell
December 11, 2018
The idea behind collaborative security is to change the security and threat landscape from the daunting “one vs. many” to “many vs. many,” embracing the power of knowledge and collaboration to protect valuable data.
2018-12-06 09:14:34

Cybersecurity 101: How to Get Started in the Business (Part 2)

By Ed Moyle and Raef Meeuwisse
December 06, 2018
In this walkthrough, InfoSec Insider experts Ed Moyle and Raef Meeuwisse demonstrate one useful exercise that can aid security practitioners in getting a lay of the land in their organization, serving as the perfect first step in ultimately measuring and reducing information security risks.
2018-12-04 05:42:01

Cybersecurity 101: A Discussion on the Basics and Fundamentals

By Ed Moyle and Raef Meeuwisse
December 04, 2018
InfoSec Insider SMEs Ed Moyle and Raef Meeuwisse are back, but this time they're talking fundamentals. If you're an up-and-coming security warrior, you'll definitely want to heed this advice from the two infosec experts.
2018-11-15 05:43:40

How to Communicate Threat Intelligence to the Board

By Marcos Colón
November 15, 2018
Cyber threats are top of mind for board members, but communicating cyber threat intelligence may not be the easiest task for security leaders. In this recent interview with Tim Callahan, senior vice president and global security officer at Aflac provides some helpful tips that could go a long way.
2018-11-13 05:35:42

How to Train Your Team (and Organization) to Effectively Use Threat Intelligence

By Josue Ledesma
November 13, 2018
Threat intelligence has transformed the information security world for the better but it’s not always leveraged in the best way possible by organizations and departments. InfoSec Insider spoke to threat intel expert Karl Sigler to get a sense of how organizations can maximize threat intelligence for their organization.
2018-10-30 05:39:26

2018 Midterm Election Security: Thoughts from Security Experts

By Marcos Colón
October 30, 2018
InfoSec Insider catches up with cybersecurity experts on the lessons learned from the 2016 election hacks, and what the security practitioner of today could learn from those events. With early voting already in full swing, we take a brief look back at what occurred.
2018-10-25 05:59:24

So, How Strong Are Your Organization's Passwords?

By Marcos Colón
October 25, 2018
Ntrepid Corporation’s Chief Scientist Lance Cottrell chats with InfoSec Insider and offers up the major dos and don’ts tied to password management, as well as pinpoints the significant weaknesses in some of the systems we’ve come to rely on heavily.
2018-10-23 05:31:29

Why Data Privacy and Policy Training Matters

By Josue Ledesma
October 23, 2018
Data privacy and protection is an often underappreciated aspect of information security, but in many ways, it provides the foundational groundwork for a well-established security environment that offers internal and external reassurance. Here's why and how you should train up your team.
2018-10-04 05:13:15

Security Automation is Here. Now What?

By Marcos Colón
October 04, 2018
enSilo CEO Roy Katmor sits with InfoSec Insider to discuss how security automation is impacting the time and duties of the modern day security professional, and how the skills they need to succeed will change as a result of the technology.
2018-09-18 05:47:59

A Look at the Windy City’s Newest Cyber Command Center

By Marcos Colón
September 18, 2018
InfoSec Insider takes a first-hand look at Trustwave’s new SpiderLabs Fusion Center in Chicago and speaks with Chris Schueler, senior vice president of managed security services, on the purpose behind its creation.
2018-09-13 05:06:59

Election Security in 2018: What’s Next?

By Marcos Colón
September 13, 2018
Forcepoint’s Dr. Richard Ford discusses the impact that the 2016 election meddling had on the cybersecurity community, and the lessons learned that security practitioners should take note of, but most importantly, act on.
2018-08-30 05:19:15

More Humans Needed: Closing the Cybersecurity Talent Gap

By Marcos Colón
August 30, 2018
Cybrary COO Kathie Miley pinpoints the real issues organizations face when it comes to the cybersecurity talent shortage, why employers are doing a good job of finding the right talent only in certain circumstances, and the impact the cybersecurity solutions market is having on the talent shortage.
2018-08-02 05:24:02

Tips on Creating Your Own Bug Bounty Program

By Marcos Colón
August 02, 2018
Bugcrowd Founder Case Ellis discusses the evolution of bug bounty programs and their impact on information security, in addition to providing tips on the key areas to focus on when it comes to developing a bug bounty program at your organization.
2018-07-31 05:07:04

How to Build Practical Cross-Training in Infosec

By Ed Moyle
July 31, 2018
Given the skills gap in information security, it's important for cybersecurity managers to diversify and expand the skill base of their team members. Here, we highlight how they can do it from a practical point of view.
2018-07-26 05:44:21

The Cyber Threat Alliance: Making Cybersecurity Collaboration Work

By Marcos Colón
July 26, 2018
The Cyber Threat Alliance’s Chief Analytic Officer Neil Jenkins provides update on the state of information sharing in 2018 and provides some insight on the steps security practitioners can take if they’re interested in sharing their threat data. 
2018-07-12 05:32:55

Are Security Professionals Doing Enough?

By Marcos Colón
July 12, 2018
Cybereason’s Israel Barak discusses the approach that far too many businesses take when it comes to their security strategy and highlights the steps that security professionals should be seeking to rethink the programs and challenges they face tied to measurably reducing risk within the business.
2018-07-05 05:45:08

How Hacked Elections Impacted the Security Industry

By Marcos Colón
July 05, 2018
CA Veracode’s Chris Wysopal discusses how the 2016 presidential election hack broadened the horizon on how security warriors think about defending their data and offers up advice on what they should consider when it comes to protecting sensitive information.
2018-06-14 05:06:03

The CISO of Yesterday, Today, and Tomorrow

By Marcos Colón
June 14, 2018
SAP CSO Justin Somaini discusses how the role of the CISO has evolved into what it is today, and what up and coming security leaders should prepare for once they take charge of a security program at a major organization.
2018-05-31 05:00:29

Cybersecurity is at Negative Unemployment. But why?

By Marcos Colón
May 31, 2018
ISACA’s Rob Clyde discusses what’s leading cybersecurity to be at negative unemployment, but also shares how addressing issues in diversity, training, and education could go a long way in closing that talent gap.
2018-05-24 05:33:11

How to Speak the Business of Security Effectively

By Marcos Colón
May 24, 2018
Cisco's Edna Conway shares her insight on what infosec leaders can do to ensure that security becomes an active discussion about the way you operate within the business, rather than an added bolt-on feature.
2018-05-01 06:16:00

ISACA Workforce Development Report Highlights Need for More & More Qualified Security Employees

By Katherine Teitler
May 01, 2018
Cybersecurity staffing requires more than simply finding enough people to accomplish tasks.
2018-04-05 06:16:00

How to Avoid Becoming the Security Scapegoat

By Katherine Teitler
April 05, 2018
When a company falls victim to a cyber incident, security personnel are often in the line fire--especially when they've focused only on the technical side of the job. Here we provide some tips that can lessen the chances that any one person will bear the absolute blame.
2018-03-29 06:16:00

The Top 10 Talks from InfoSec World 2018

By Katherine Teitler
March 29, 2018
Another year, another successful InfoSec World in the books. While we're sad it's over, here's a brief look at the best-attended talks at this year's show.
2018-03-15 06:16:00

A Brief Guide to Cybersecurity for SMBs

By Katherine Teitler
March 15, 2018
Small- and medium-sized companies must be vigilant about cybersecurity--even if they don't have the staff to handle it internally.
2018-03-01 06:16:00

Key Questions to Ask Your Cybersecurity Recruiter

By Katherine Teitler
March 01, 2018
There is no question that the cybersecurity job market is hot, but not any old recruiter is suited to help you with your hiring needs.
2018-02-06 06:16:00

Selling Security Metrics to the Board of Directors

By Katherine Teitler
February 06, 2018
For security metrics to be relevant to the board of directors, security teams must tell the story of how those metrics are supporting business goals. How to accomplish this is no easy task.
2018-02-02 06:16:00

Lessons Learned from Running Which Also Apply to a Career in IT

By Jeremy Finke
February 02, 2018
What do running and your career in information technology/information security have in common? At first glance, not a whole lot. But with a couple of quick examples, I think we will find some similarities.
2018-01-31 06:16:00

Analyzing Your Government Contract Cybersecurity Compliance

By Robert Jones
January 31, 2018
If you're a government contractor or a government entity hiring contractors, you need to know the ins and outs of the new FAR and DAR Councils' cybersecurity rules for government contractors.
2018-01-30 06:16:00

Have Point Solutions Reached End of Life?

By Katherine Teitler
January 30, 2018
The infosec tools market can be overwhelming with its abundance of options. How do you choose the best tool for your environment? This informative article will help point you in the right direction.
2018-01-25 06:16:00

Learning to Influence Without Authority

By Katherine Teitler
January 25, 2018
CISOs may have a highly-respected job title, but earning influence with business peers is a more significant challenge.
2018-01-16 06:16:00

The Art of Aligning Security Goals with Business Goals

By Katherine Teitler
January 16, 2018
To help security leaders find new ways to better align with business colleagues, we turned to two experts to find out how they’re constantly maneuvering between technical requirements and fueling business priorities.
2018-01-04 06:16:00

Security New Year’s Resolutions

By Katherine Teitler
January 04, 2018
Working in the field of cybersecurity can be extremely rewarding, but it can also be extremely stressful and lead to burnout, if you let it.
2017-12-28 06:30:00

6 Things Security Practitioners Should Know About the SOC

By Katherine Teitler
December 28, 2017
The security operations center is a critical element of running a situationally aware security organization. Unfortunately, many companies today don’t have the resources to form one.
2017-12-26 06:12:00

Readers Choice: Top 10 InfoSec Insider Articles of 2017

By Marcos Colón
December 26, 2017
You picked them! Here's a look at the most read articles published on InfoSec Insider in 2017. From CASB to threat intelligence, you'll find a unique mix of some engaging content that answers some of your pressing questions.
2017-12-11 07:46:00

Choosing the Infosec Career Path That’s Right for You

By Katherine Teitler
December 11, 2017
Choosing the right infosec career path might not be cut and dried, but certain personalities may be a better for for some roles.
2017-11-29 07:46:00

Becoming a Transformational CISO

By Katherine Teitler
November 29, 2017
Qualys's Mark Butler shares why CISOs must be more than security practitioners who keep their organization's data safe.
2017-11-21 07:46:00

How I Became a Senior Software Architect

By Katherine Teitler
November 21, 2017
Infosec Insider learns how practitioners from across the cybersecurity industry came into their current security role.
2017-11-15 07:46:00

We Don’t Need More Security Awareness Training

By Katherine Teitler
November 15, 2017
Security awareness works, so why isn't it helping our enterprise become more secure?
2017-11-06 05:08:21

Upstream Disconnect: Why CISOs and the Board Aren’t Seeing Eye to Eye

By Marcos Colón
November 06, 2017
After conducting 80 interviews with security leaders and board members, these two experts discuss the findings of their research and offer a rare window into how each group viewed progress and setbacks in their oversight of cyber risk.
2017-11-01 07:46:00

The Cyber Professional’s Personality Profile

By Dominic Vogel
November 01, 2017
To get the most out of your relationship with your CISO, it will be helpful for you to understand what makes them tick.
2017-10-26 07:46:00

How I Became a CTO

By Katherine Teitler
October 26, 2017
Infosec Insider learns how practitioners from across the cybersecurity industry came into their current security role.
2017-10-23 07:46:00

Hiring for Security is Hard. So What?

By Katherine Teitler
October 23, 2017
Cybersecurity staffing is a hot button issue, but not one that can be ignored just because it's a challenge.
2017-10-19 07:46:00

How I Became a Threat Intelligence Professional

By Katherine Teitler
October 19, 2017
Infosec Insider learns how practitioners from across the cybersecurity industry came into their current security role.
2017-10-11 06:02:33

Why IoT Devices Turn Up the Heat on Security Pros

By Marcos Colón
October 11, 2017
Trustwave Threat Intelligence Manager Karl Sigler discusses the non-traditional devices that security professionals should have on their radar and how thermostats can figuratively turn up the heat for infosec pros, and literally for the enterprise.
2017-10-10 07:46:00

The Security Talent Gap, Not Just A People Problem

By David Etue
October 10, 2017
New people, more education, and development are not the only ways to fill the security talent gap.
2017-10-05 07:46:00

How I Became a Trust and Security Engineer

By Katherine Teitler
October 05, 2017
Infosec Insider learns how practitioners from across the cybersecurity industry came into their current security role.
2017-09-28 06:09:00

Information Security Leadership is About People

By Katherine Teitler
September 28, 2017
Tom Eston shares his thoughts on what it takes to become a leader, and why it's important for security practitioners to do so.
2017-09-27 07:46:00

Hackers Aren’t all Bad… $15k for Puerto Rico Recovery

By Joshua Marpet
September 27, 2017
Hackers donate to Puerto Rico hurricane disaster relief fund through Hackers for Charity.
2017-09-25 07:46:00

Where Are All My Ladies in Cybersecurity?

By Katherine Teitler
September 25, 2017
When it comes to women in the workforce, it’s a fairly well-known fact that information security does a pretty terrible job of increasing the ratio of women to men.
2017-09-20 07:46:00

Who Cares About Infosec Anyway?

By Katherine Teitler
September 20, 2017
Security awarness programs that focus on what's important to security practitioners are less effective than those than focus on employee interests.
2017-08-23 05:27:00

Security is a Skill Set, Not a Tool

By Katherine Teitler
August 23, 2017
Adrian Sanabria shares why tools acquisition isn't the answer to your information security woes, and explains how teams can increase efficacy without increasing expenditures.
2017-07-31 08:30:00

Key Hiring Questions to Ask During Infosec Interviews

By Katherine Teitler
July 31, 2017
We’ve all heard about the security staffing shortage; it attracts a lot of press and is hard to ignore. If you’re currently working for an organization that is not hiring, you, yourself, might be receiving regular calls from recruiters about one of the estimated 1 million open positions. Maybe you’re even covertly scoping out your next job opportunity. 
2017-07-19 07:46:00

A Day in the Life of a Security Executive (part 4)

By Katherine Teitler
July 19, 2017
A look at the career path of information security executive Georgia Weidman.
2017-07-12 07:46:00

A Day in the Life of a Security Executive (part 3)

By Katherine Teitler
July 12, 2017
A look at the career path of information security executive Summer Fowler.
2017-07-06 07:00:00

How Far Should You Go with Employee Monitoring?

By Katherine Teitler
July 06, 2017
Depending on your source, insider threat accounts for anywhere from 27% - 77% of all breaches. Despite the disparity in agreement about size of the problem, most security practitioners agree that the difficulty identifying insider threat is greater than identifying external threats.  
2017-06-29 07:46:00

A Day in the Life of a Security Executive (part 2)

By Katherine Teitler
June 29, 2017
A look at the career path of information security executive Kristy Westphal.
2017-06-26 07:46:00

The “Best Practice” Parable

By Joshua Marpet
June 26, 2017
"Best practices” are subjective, of course, though the phraseology leads people to believe that these “best practices” are, in fact, the best. 
2017-06-15 07:57:43

A Day in the Life of a Security Executive

By Marcos Colón
June 15, 2017
A look at the career path of information security executive Christy Wyatt.
2017-06-08 07:46:00

Becoming the Best Infosec Leader, Even Under Difficult Circumstances

By Katherine Teitler
June 08, 2017
The pressures of leading a security organization are diverse. From hiring the right staff, to keeping up with technological change.
2017-05-30 07:46:00

Why Customer Service is a Big Part of Your Security Job

By Katherine Teitler
May 30, 2017
Not too long ago an acquaintance sent me a frantic instant message, thinking she might have accidentally downloaded malware after clicking on an email attachment.
2017-04-25 07:46:00

A Look at Security Leaders’ Priorities

By Katherine Teitler
April 25, 2017
There’s a phrase that’s oft repeated when a person is trying to understand what’s on the mind of and what motivates another person: What keeps you up at night?
2017-04-10 08:00:00

Tips for Managing Diverse Personalities on Your Security Team

By Katherine Teitler
April 10, 2017
A security team—just like any functional area team—is made of up unique individuals with distinct personalities and working styles.
2017-03-13 08:00:00

Executives and IT Decision Makers Don’t See Eye-to-Eye on Security

By Katherine Teitler
March 13, 2017
A new study published by BAE Systems highlights the disconnect between C-level executives and IT Decision Makers when it comes to perceptions of cybersecurity within the enterprise.
2017-02-23 08:30:00

Building Strong Infosec Teams through Diversity

By Katherine Teitler
February 23, 2017
In biology, it is well known that genetic diversity creates strength in that it helps build resilience to disease, disorders, and other human ailments. At a community level, we also find strength in diversity.
2017-02-15 11:48:00

The Continued Evolution of the CISO Role

By Marcos Colón
February 15, 2017
While some security professionals have climbed the ranks based on their technical know-how, it’s the transition into the business leadership role that tends to present the challenges for chief security officers. 
2017-02-07 08:31:00

Leadership Lessons from the Orchestra

By Katherine Teitler
February 07, 2017
Leadership is a lot like playing in an orchestra. For those less familiar with an orchestra setting, let me explain. The basics: A traditional orchestra is made up of strings, woodwinds, brass, and percussion, plus keyboards. 
2017-02-03 08:31:00

What Happens When the President Insists on an Unsecure Device?

By Katherine Teitler
February 03, 2017
The President of the United States is apparently using an Android phone, and likely an outdated version, at that. Despite reports that the newly inaugurated president was, in typical fashion, offered a “secure, encrypted device approved by the Secret Service,” it appears Mr. Trump prefers his own personal device. Don’t we all?
2016-12-23 07:45:00

The Best of InfoSec Insider in 2016

By Marcos Colón
December 23, 2016
As we continue to ramp up our efforts in providing you with a resourceful library of content you can rely on, we’ve decided to reflect on some of the top InfoSec insider articles of 2016, based on the engagement we’ve received from our readers.
2016-10-26 08:00:00

Please, Stop with the FUD Already

By Katherine Teitler
October 26, 2016
Last week, as much of the U.S. was inconvenienced by the widespread DDoS attack on many popular websites, Joomla! casually released a notice warning of a critical patch to its software.
2016-10-19 08:00:00

The CIO Isn’t Your Enemy (but may be your boss)

By Katherine Teitler
October 19, 2016
Security teams fight many battles. There are threats, vulnerabilities, exploits, improperly configured systems, legacy equipment, lean budgets, staffing shortages, and users who are fallible. Any of these things, alone, add up to challenge, but possibly the biggest challenge security teams face is the battle between the security department and the CIO.
2016-10-17 08:00:00

Security’s Message is Getting Lost in the Hype

By Katherine Teitler
October 17, 2016
Remember the “telephone game” played at parties when you were a kid? One person would make up a sentence or phrase which she or he then whispered into the ear of the person sitting next to him/her in a circle. That person would, in turn, whisper what he/she had heard into the ear of the next person in the circle.
2016-10-14 08:00:00

Developing the Super CISO

By Katherine Teitler
October 14, 2016
Defining a “good” chief information security officer is difficult. On one side, many CISOs have risen through the security ranks due to their technical prowess and were thus handed a “business position,” asked to manage a team, and required to start briefing the executive suite on the state of the company’s security.
2016-10-07 08:00:00

Where is all the Security Talent?

By Katherine Teitler
October 07, 2016
Rumblings about the security talent deficit are pervasive. Just like news of recent breaches, it’s hard to get through a week without reading an article, viewing a webcast, or attending a conference during which the subject is not addressed. 
2016-09-16 08:00:00

Securing Security’s Future Through Better Hiring

By Katherine Teitler
September 16, 2016
Hiring security staff is a big challenge. Not only does the industry need more people to fill the open positions than it currently has, but to complicate matters further, hiring managers aren’t necessarily security professionals themselves; many organizations’ security teams report to IT, operations, or even finance.  
2016-09-14 08:00:00

Do Security Certs Matter to You?

By Katherine Teitler
September 14, 2016
By many estimates, the demand for information security practitioners far exceeds availability. As security becomes an appreciable concern for large and small companies alike, it stands to reason that the industry is going to face a serious shortage in the coming years if new practitioners aren’t found or cultivated.
2016-09-08 10:00:00

Interested in Becoming an InfoSec Pro? Here’s Some Sage Advice

By Marcos Colón
September 08, 2016
Unless you're oblivious to the news, you're well aware that the information security industry is getting a lot of attention. Be it the headline-grabbing breaches taking place on a seemingly frequent basis, or the fact that the number of digital internet-connected devices per capita is increasing constantly.
2016-08-19 08:00:00

Security Teams Suffer from lack of Visibility

By Katherine Teitler
August 19, 2016
Information security teams face a serious problem when they are unable to detect the presence of a threat actor inside organizational systems. Knowing who has access to key applications is an imperative for trying to protect the company, yet according to a new report published by Okta that may not be a case.
2016-08-15 08:00:00

Hacking the Term “Hacker”

By Katherine Teitler
August 15, 2016
The term “hacker” is thrown around liberally nowadays. It’s a surefire traffic-boosting headline, and the media seizes any opportunity to publish a story with a hacker connection, often positioning the word as a synonym for “malicious attacker.”
2016-07-19 08:30:00

CISOs Need to be More Than Business Leaders

By Katherine Teitler
July 19, 2016
The role of the CISO is changing. We hear about it every day: CISOs must become more business oriented and fine-tune communication skills so other executives consider heads of security business equals.
2016-07-08 08:00:00

The Evolution of Cybersecurity

By Katherine Teitler
July 08, 2016
“A lot of security departments are swimming in the wrong direction,” says Raef Meeuwisse, Director of Cybersecurity at Cyber Simplicity Ltd. By this, Meeuwisse means that companies haven’t yet redirected the scope of their security programs—the tools, technologies, and processes—to reflect current threats. 
2016-06-29 09:00:00

Third Party Risk Management: The Russian nesting doll of infosec challenges

By Marcos Colon
June 29, 2016
For security practitioners, the name of the game is risk management. These risks come in all shapes and sizes, from system vulnerabilities and the onslaught of evolving malware, to threats posed by insiders.
2016-06-21 08:00:00

The Security Practitioner’s Future

By Katherine Teitler
June 21, 2016
Several years after the introduction of DevOps, the security community continues to laud the method while scant few developers are hopping on the bandwagon. One of the issues is that “security” isn’t part of DevOps. 
2016-06-17 08:00:00

What You Missed at Cloud Security World 2016

By Katherine Teitler
June 17, 2016
Cloud Security World 2016 finished up on Wednesday evening after two days of conversation around all-things-cloud security. “We’ve seen this before,” was a common refrain, and thankfully attendees have moved past the points of denying the existence of cloud services connected to their organizations and saying that cloud is “the largest” security concern.
2016-06-07 08:00:00

Avoid Being the Infosec Scapegoat

By Katherine Teitler
June 07, 2016
During the recent EuroCACS conference Raef Meeuwisse, Director of Cybersecurity & Data Privacy Governance at Cyber Simplicity Ltd., referred to the CISO as the “Chief Information Scapegoat Officer,” based on an article posted on Infosecurity Magazine. 
2016-04-13 08:00:00

Where Will You Find Your Next-Generation Workforce?

By Katherine Teitler
April 13, 2016
The entire security industry knows we have a staffing problem. With demand for security talent far greater than supply, companies with the right resources are positioned to lure top talent from competitors while everyone else is scrambling to find anyone with adequate technical acumen to learn the craft.
2016-03-11 08:00:00

The Race to Protect Customer Privacy and Gain Trust is On

By Katherine Teitler
March 11, 2016
Technology is an inescapable part of our lives. Unless you live completely off the grid—grow your own food, never drive a car, transact with only the cash kept under your mattress inside your built-by-your-own-hands house—your personal information is collected, tracked, and exchanged by and among businesses.
2016-02-14 12:00:00

The Evolution of Security and the Opportunity of Leadership

By Michael Santarcangelo, founder, Security Catalyst
February 14, 2016
A few decades ago, we advanced information security with a simple phrase: "the Internet is bad, a firewall is good." We linked the dangers of connecting to others online with a simple method of protecting our companies. Now our ever-changing networks face dynamic, evolving threats.

CPE imageMIS Training Institute is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org.  

Copyright ©2019 MIS Training Institute Holdings, Inc. All rights reserved.  
Contact Us | Privacy | Terms and Conditions | Cookie Policy | Site Map Regional Preference